EP2474151A1 - Wireless security device and method - Google Patents
Wireless security device and methodInfo
- Publication number
- EP2474151A1 EP2474151A1 EP10742958A EP10742958A EP2474151A1 EP 2474151 A1 EP2474151 A1 EP 2474151A1 EP 10742958 A EP10742958 A EP 10742958A EP 10742958 A EP10742958 A EP 10742958A EP 2474151 A1 EP2474151 A1 EP 2474151A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- wireless
- bluetooth
- security device
- wireless security
- telephony device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 108
- 230000004044 response Effects 0.000 claims description 23
- 230000004913 activation Effects 0.000 claims description 18
- 230000003213 activating effect Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 11
- 238000005259 measurement Methods 0.000 claims description 11
- 238000009826 distribution Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 description 75
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 238000003860 storage Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 7
- 230000000007 visual effect Effects 0.000 description 6
- 230000001413 cellular effect Effects 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000001276 controlling effect Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000003990 capacitor Substances 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 238000003306 harvesting Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
- G08B15/004—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives using portable personal devices
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72424—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with manual activation of emergency-service functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B3/00—Audible signalling systems; Audible personal calling systems
- G08B3/10—Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/60—Substation equipment, e.g. for use by subscribers including speech amplifiers
- H04M1/6033—Substation equipment, e.g. for use by subscribers including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
- H04M1/6041—Portable telephones adapted for handsfree use
- H04M1/6058—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone
- H04M1/6066—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone including a wireless connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/10—Details of telephonic subscriber devices including a GPS signal receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Definitions
- This disclosure relates to security and, more particularly, to wireless security devices and methods.
- Bluetooth wireless technology is used in many ways today. Most countries now require the use of handsfree systems while driving a motorized vehicle in order to avoid driver distractions on the roads. As a result, almost every phone produced today supports the Bluetooth Hands-Free and Bluetooth Headset profile.
- a device that protects a mobile phone or media players from theft or loss using the Bluetooth wireless technology may be useful to help protect this valuable data or media.
- a device that places emergency telephone calls through a Bluetooth mobile phone is also needed.
- a device that includes additional security features may protect a user even further.
- a wireless security device may include processor, a wireless transceiver, a memory; and computer program instructions stored in the memory, which, when executed by the processor, cause the wireless security device to perform operations.
- the operations may include implementing one or more Bluetooth wireless protocol profiles for connecting to one or more Bluetooth enabled devices; wirelessly pairing, via the wireless transceiver, with a Bluetooth enabled telephony device using at least one of the one or more Bluetooth wireless protocol profiles, thus creating a wirelessly paired Bluetooth connection between the wireless security device and the telephony device; sending a command, over the wirelessly paired Bluetooth connection, to the telephony device to place a telephone call to an emergency telephone number; and sending a prerecorded emergency message to the telephony device over the wirelessly paired Bluetooth connection, causing the telephony device to play the prerecorded emergency message.
- the Bluetooth wireless protocol profiles may be a Bluetooth hands-free profile, a Bluetooth headset profile, and/or a Bluetooth advanced audio distribution profile.
- the operations may include receiving, over the wirelessly paired Bluetooth connection, a location of the Bluetooth enabled telephony device, and identifying the emergency telephone number based on the location.4.
- receiving the location of the Bluetooth enabled telephony device may include sending a command to: a telephone number of the telephony device, a telephone network providing service to the telephony device, and/or a global positioning system (GPS) location of the telephony device.
- GPS global positioning system
- a response from the telephony device may include a telephone number of the telephony device, a telephone network providing service to the telephony device, and/or a GPS location of the telephony device.
- the operations may also include determining a current location of the telephony device based on one or more of the telephone number, the telephone network, and the GPS location.
- Identifying the emergency telephone number may include accessing a lookup table stored in the memory.
- the lookup table may include location codes and emergency telephone numbers associated with the location codes.
- the location of the one or more emergency telephone numbers may be correlated with at least one of the one or more location codes to obtain the location.
- the wireless security device may also include a speaker and a microphone.
- the operations may further include providing speakerphone services such as sending audio data captured by the microphone to the telephony device via the wireless transceiver, and audibly playing, by the speaker, audio data received from the telephony device via the wireless transceiver.
- the wireless security device may also generate a panic alarm by generating an audible sound through the speaker.
- the wireless security device may also include a light emitting diode and a vibration motor.
- the wireless security device may generate a notification when an incoming telephone call is received by the telephony device.
- the wireless security device may generate an out-of-range notification when a measurement of a quality parameter of the Bluetooth wireless connection indicates the quality parameter of the Bluetooth wireless connection is outside a predetermined quality threshold.
- the out-of-range notification may include generating a unique out-of-range notification for each Bluetooth enabled device if more than one Bluetooth enabled devices are paired with the wireless security device.
- the wireless security device generate a notification when at least one of the one or more Bluetooth wireless protocol profiles is disconnected by a paired Bluetooth device.
- the notifications may comprise illuminating the light emitting diode, activating the vibration motor, and/or generating an audible sound through the speaker.
- the wireless security device may also include a button.
- the wireless security device may cause a telephony device to answer or cancel an incoming telephone call.
- the wireless security device may also cancel a panic alarm.
- the processor and/or the wireless security transceiver of the wireless security device may implement Bluetooth low energy technology.
- a method includes implementing, by a wireless security device, one or more Bluetooth wireless protocol profiles for connecting to one or more Bluetooth enabled devices.
- the method may wirelessly pair, via a wireless transceiver of the wireless security device, with a Bluetooth enabled telephony device using at least one of the one or more Bluetooth wireless protocol profiles, thus creating a wirelessly paired Bluetooth connection between the wireless security device and the telephony device.
- the method may cause the wireless security device to send a command over the wirelessly paired Bluetooth connection, to the telephony device.
- the command may cause the telephony device to place a telephone call to an emergency telephone number.
- the method may send a prerecorded emergency message from the wireless security device to the telephony device over the wirelessly paired Bluetooth connection, causing the telephony device to play the prerecorded emergency message.
- the Bluetooth wireless protocol profiles may be a Bluetooth hands-free profile, a Bluetooth headset profile, and/or a Bluetooth advanced audio distribution profile.
- the method may receive, over the wirelessly paired Bluetooth connection, a location of the Bluetooth enabled telephony device; and may identify the emergency telephone number based on the location.
- Receiving the location of the Bluetooth enabled telephony device may include sending a command to the telephony device requesting a telephone number of the telephony device, a telephone network providing service to the telephony device, and/or a global positioning system (GPS) location of the telephony device.
- GPS global positioning system
- the method may also include receiving a response from the telephony device.
- the response may include a telephone number of the telephony device, a telephone network providing service to the telephony device, and/or a GPS location of the telephony device.
- the method may determine a current location of the telephony device based the telephone number, the telephone network, and/or the GPS location.
- Identifying the emergency telephone number may include accessing a lookup table stored in the memory.
- the lookup table may include location codes, and emergency telephone numbers associated with the one or more location codes. Identifying the emergency telephone number may also include correlating the location with at least one of the location codes to obtain at least one of the one or more emergency telephone numbers.
- the method may also send audio data captured by a microphone of the wireless security device to the telephony device via the wireless transceiver, and/or audibly play, by a speaker of the wireless security device, audio data received from the telephony device via the wireless transceiver.
- the method may cause the wireless security device generate a notification when an incoming telephone call is received by the telephony device.
- the method may also cause the wireless security device to generate an out-of-range notification when a measurement of a quality parameter of the Bluetooth wireless connection indicates the quality parameter of the Bluetooth wireless connection is outside a predetermined quality threshold. If more than one Bluetooth enabled devices are paired with the wireless security device, the out-of-range notification may include a unique out-of-range notification for each Bluetooth enabled device.
- the method may also generate a notification when a Bluetooth wireless protocol profiles is disconnected by a paired Bluetooth device.
- the notification may include illuminating at least one light emitting diode of the wireless security device, activating a vibration motor of the wireless security device, and/or generating an audible sound through a speaker of the wireless security device.
- the method may cause the telephony device to answer or cancel an incoming call received by the telephony device.
- the method may also cause the telephony device to cancel a panic alarm.
- FIG. 1 is diagrammatic view of a wireless security device and network infrastructure.
- FIG. 2 is an architectural block diagram of a wireless security device.
- FIG. 3 is a flowchart view of a security process.
- FIG. 4 is diagrammatic view of a wireless security device paired to a telephony device.
- FIG. 5 is diagrammatic view of a wireless security device paired to a telephony device.
- FIG. 6 is a data layout view of a lookup table containing geographic locations and emergency numbers.
- FIG. 7 is an architectural block diagram of notification components of a wireless security device.
- FIG. 8 is an external view of a wireless security device.
- the present invention may be embodied as a system, method or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module” or “system.” Furthermore, the present invention may take the form of a computer program product embodied in one or more computer-readable (i.e., computer- usable) medium(s) having computer-usable program code embodied thereon.
- computer-readable i.e., computer- usable
- the computer-readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, a device, or any suitable combination of the foregoing.
- the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
- the computer-readable storage medium could even be paper or another suitable medium upon which a program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
- a computer-readable storage medium may be any medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- a computer readable signal medium may include a propagated data signal with computer-usable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof,
- a computer readable signal medium may be any computer-readable medium that can contain, store, communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc.
- Computer program code for carrying out operations of the present invention may be written in an object oriented programming language such as Java, Smalltalk, C++ or the like. However, the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the "C" programming language or similar programming languages.
- the program code may execute entirely on a computing device, such as the wireless security device described below, partly on a computing device, as a stand-alone software package, partly on a remote computer or computing device, or entirely on a remote computer or server. In the latter scenario, the remote computing device may be connected to the user's computer through a local area network (LAN), a wide area network (WAN), or a personal area network (PAN) (e.g. a Bluetooth network), for example.
- LAN local area network
- WAN wide area network
- PAN personal area network
- embodiments of the invention may implement, execute, or run the elements and/or blocks of the flowchart illustrations in any appropriate order, even though the flowchart illustrations may depict a particular embodiment with each block in a particular order.
- These computer program instructions may also be stored in a computer- readable memory that can direct a processor or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer- readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computing device or other programmable data processing apparatus to cause a series of operational steps to be performed on the computing device or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- FIG. 1 depicts a computing infrastructure within which security process 10 may reside.
- FIG. 1 shows personal area network 12.
- Personal area network 12 may be a wireless network used to communicate among computer devices over a relatively short range.
- personal area network 12 may be a Bluetooth network.
- Bluetooth is a wireless protocol for connecting and exchanging data between electronic devices over short distances.
- Various devices may be part of personal area network 12. For example,
- FIG. 1 shows wireless security device 14 connected to telephony device 16, 18 and media player 20, as shown by network connections 22, 24, 26.
- Telephony devices 16, 18 may be devices capable of placing a telephone call over a wireless or wired telephone network.
- telephony devices 16, 18 may be cellular telephones, smart phones, modems, personal digital assistants, wired telephones, or other telephone or computing devices capable of placing a telephone call.
- Telephony devices 16, 18 may also be capable of performing other functions.
- Telephony devices 16, 18 may include a processor (not shown) and a memory (not shown).
- Telephony devices 16, 18 may also include software instructions stored in the memory, which, when executed by the processor, cause telephony devices 16, 18 to perform operations such as executing a software application, executing an operating system, and communicating over a WAN network, for example. Telephony devices 16, 18 may also be capable of playing media files, such as audio or video files.
- Media player 20 may be a device capable of playing media files, such as audio or video files.
- Media player 20 may also include a processor (not shown) and a memory (not shown).
- Media player 20 may also includes software instructions, stored in the memory, which, when executed when executed by the processor, cause media player 20 to perform operations such as executing a software application, executing an operating system, and communicating over a WAN network, for example.
- Examples of media player 20 may include, but are not limited to, an iPodTM and a ZuneTM media player, for example. In some cases, media player 20 may not be able to perform telephony device functions, such as placing or receiving a phone call.
- Wireless security device 14 may also be connected to computer 28 via network connection 30.
- Computer 28 may be a general purpose computer such as a workstation or a server computer, a laptop computer, a desktop computer, a netbook computer, or any other type of computer or computing device.
- Wireless security device 14 is also shown connected to routing device 32 through network connection 34.
- Routing device 32 may be a routing device for communication between two or more networks.
- routing device is also connected to network 36.
- Network 36 may be a wide area network, a local area network, a personal area network, a cellular network, or any other type of network.
- Wireless security device may communicate with network 36 via routing device 34, for example.
- Wireless security device 14 may also communicate with network 36 through various other communication paths. As shown in FIG. 1., wireless security device 14 may also communicate with network 36 through network connection 30 and computer 28, for example. In general, wireless security device 14 may also communication with network 36 (or other networks) through any available network communication path including but not limited to any of the telephony devices 16 and 18, or any media player 20.
- the various computing devices may be Bluetooth enabled devices.
- the various computing devices may implement and/or comply with the Bluetooth wireless protocol.
- Bluetooth is a wireless networking protocol that allows devices to communicate over wireless connections. If the various computing devices are Bluetooth enabled devices, then network connections 22, 24, 26, and/or 30 may be Bluetooth network connections.
- FIG. 2 shows an architectural block diagram of wireless security device 14.
- wireless security device 14 may include processor 202 and memory 204.
- Memory 204 may be any type of computer readable storage medium, including, but not limited to, a hard drive, a CD, a DVD, a random access memory (RAM), a read only memory (ROM), a FLASH memory, or any other type of computer readable storage medium capable of storing program instructions.
- processor 202 may be processor specific to Bluetooth applications. However, processor 202 may also be a general purpose processor programmed with software instructions to perform operations specific to a Bluetooth application. Processor 202 may be programmed with software instructions to perform the operations of security process 10 (which will be discussed below), and/or programmed with software instructions to perform any other operations defined and/or implemented by the software instructions. Processor 202 may be a single processor, or may be a series of processors. Processor 202 may also be a chipset comprising multiple processors, computer chips, and or computer chip dies. Processor 202 may include input and output interface lines to communicate with, take input from, and/or provide output to other devices or elements.
- processor 202 may include a memory interface/bus for communicating with memory 204, a communication interface/bus for communicating with wireless transceiver 208, an audio interface/bus for communicating with speaker 210 and/or microphone 212, and a general purpose IO interface for communicating with and controlling vibration motor 214 and/or LED bank 216.
- Wireless security device 14 may also include wireless transceiver 206 and antenna 208. Wireless transceiver 206 and antenna 208 may provide connectivity to a wireless network, such as personal area network 12, which may include sending and receiving wireless signals from the various devises that comprise personal area network 12, for example. Although shown as separate from processor 202, wireless transceiver 206 and or antenna 208 may be, in some embodiments, incorporated into processor 202. For example, wireless transceiver 206 and/or antenna 208 may be part of the same computer chip as processor 202, and/or may be part of the same chipset as processor 202.
- Wireless transceiver 206 may be a Bluetooth wireless transceiver, for example, configured to provide connectivity via the Bluetooth wireless protocol.
- antenna 208 may be configured or optimized to provide communication over a Bluetooth wireless connection.
- Antenna 208 may be any type of antenna, including but not limited to: a patch antenna, a wire antenna, a dipole antenna, a microwave antenna, a slotted cylinder antenna, a helical antenna, or any other type of antenna for providing wireless communication.
- Wireless security device 14 may also comprise various input, output, and/or feedback elements, as shown in FIG. 2.
- Wireless security device 14 may include speaker 210 and/or microphone 212, for example.
- Speaker 210 may be an audio speaker, a piezo element, or series of speakers, which may provide audible and/or inaudible sounds. As shown in FIG. 2, speaker 210 is coupled to processor 202. Accordingly, processor 202 and/or software executed by processor 202 may control the audio sounds made by speaker 210. However, it is not necessary for speaker 210 to be directly coupled to processor 202, as shown in FIG. 2. For example, speaker 210 may be directly coupled to an audio driver circuit (not shown) that is coupled either directly or indirectly to processor 202.
- Microphone 212 may be an audio microphone, or series of microphones, which may allow wireless security device to capture and/or record audible and/or inaudible sounds. As shown in FIG. 2, microphone 212 is coupled to processor 202. Accordingly, processor 202 and/or software executed by processor 202 may control microphone 212. However, it is not necessary for microphone 212 to be directly coupled to processor 202, as shown in FIG. 2. For example, microphone 212 may be directly coupled to an audio driver circuit (not shown) that is coupled either directly or indirectly to processor 202.
- Wireless security device 14 may also include vibration motor 214.
- Vibration motor 214 may be a vibration motor which, when activated, causes wireless security device 14 to vibrate. If vibration motor 214 is activated, vibration motor 214 may cause wireless security device 14 to vibrate. The vibration may provide an alert to a user (either visually, audibly, or through tactile feedback). As shown in FIG. 2, vibration motor 214 may be coupled to processor 202. Accordingly, processor 202 and/or software executed by processor 202 may control vibration motor 214. However, it is not necessary for vibration motor 214 to be directly coupled to processor 202, as shown in FIG. 2. For example, vibration motor 214 may be directly coupled to and a motor driver circuit (not shown) that is coupled either directly or indirectly to processor 202.
- Wireless security device 14 may also include a visual indicator (LED) bank 216.
- LED bank 216 may include one or more light emitting diodes (LEDs) or other visual indicators or lights. As shown in FIG. 2, LED bank 216 is coupled to processor 202. Accordingly, processor 202 and/or software executed by processor 202 may control any LEDs within LED bank 216. However, it is not necessary for LED bank 216 to be directly coupled to processor 202, as shown in FIG. 2. For example, LED bank 216 may be directly coupled to an display, strobe, or LED driver circuit (not shown) that is coupled either directly or indirectly to processor 202.
- LED bank 216 may be directly coupled to an display, strobe, or LED driver circuit (not shown) that is coupled either directly or indirectly to processor 202.
- Wireless security device 14 may also include button 218.
- Button 218 may be a single button or switch, or a series of buttons and/or switches.
- Button 218 may be any type of button or switch that allows a user of wireless security device 14 to provide input to wireless security device 14.
- button 218 may be a button or switch including, but not limited to: a pushbutton, a toggle button, a toggle switch, a selector switch, a momentary button, etc.
- a user may be able to momentarily activate button 14 (i.e. a momentary button), permanently activate button 14 (i.e. a toggle button).
- Momentarily activating button 14 may include activating button 14 for a short period of time (e.g. less than one second), multiple times (e.g. a double button press), or a longer period of time (e.g. more than one second).
- button 218 is coupled to processor 202. Accordingly, processor 202 and/or software executed by processor 202 may control and/or monitor button 218. Monitoring button 218 may include monitoring activation of button 218, and/or monitoring the duration of activation of button 218. It is not necessary for button 218 to be directly coupled to processor 202, as shown in FIG. 2. For example, button 218 may be directly coupled to a button driver circuit (not shown) that is coupled either directly or indirectly to processor 202.
- Wireless security device 14 may also include power supply 220.
- Power supply 220 may provide power to security device 14 and/or the components and circuits of security device 14.
- Power supply 220 may include a disposable battery, a rechargeable battery, a solar cell, a super-capacitor, a power harvesting circuit, a recharge circuit, or any other power source for providing power to security device 14.
- processor 202, wireless transceiver 206, and or security device 14 may implement Bluetooth low energy technology. Accordingly, in an embodiment, power supply 220 may be configured to provide power to a Bluetooth low energy technology compliant device.
- security process 10 may reside in memory 204, and may be executed by processor 202.
- security process 10 may implement one or more Bluetooth wireless protocol profiles for connecting to one or more Bluetooth enabled devices.
- a Bluetooth wireless protocol profile may be an interface that allows Bluetooth enabled devices to communicate with each other within a set of defined parameters.
- Bluetooth wireless protocol profiles may include a hands-free profile, a headset profile, and/or an advanced audio distribution profile, as well as other types of Bluetooth wireless protocol profiles, for example.
- a hands-free profile may provide services and features over a Bluetooth wireless connection that allow hands-free kits to communicate with mobile phones.
- the headset or hands -free profile may allow security device 14 to re-route audio from a telephone call received by telephony device 16, 18 through speaker 210 and/or microphone 212.
- the headset or hands-free profile may also allow wireless security device 14 to send commands to telephony devices 16, 18.
- the commands may include AT commands, modem commands, or other commands for controlling features and functions of telephony devices 16, 18.
- the headset or hands-free profile may also allow wireless security device 14 to cause telephony devices 16, 18 to place a call, answer a call, dial a phone number, or retrieve network- specific data, or GPS data, etc.
- a headset profile may provide services or functions over a Bluetooth network connection that allow wireless security device 14 to act as a mobile telephone headset.
- the headset profile may allow a user to answer a telephone call received on telephony devices 16, 18 by pressing or holding button 218, for example.
- the headset profile may also allow a user of wireless security device to hear audio from the telephone call through speaker 210 coupled to wireless security device 14, and/or provide audio for the telephone call through microphone 212 coupled to wireless security device 14.
- An advanced audio distribution profile may provide services or functions over a Bluetooth network connection that allow wireless security device 14 to stream audio.
- wireless security device 14 may be able to stream audio to/from telephony device 16, 18, media player 20, and/or computer 28, for example.
- Security process 10 may wirelessly pair 304 with one or more telephony devices, such as telephony devices 16, 18.
- Wirelessly pairing may include establishing a wireless connection with telephony devices 16, 18, or any other Bluetooth enabled device.
- wireless security device 14 and telephony devices 16, 18 may agree to communicate with each other and establish a connection.
- the pairing process may include handshaking processes, authentication processes, and/or the sharing of a security passkey.
- wireless security device 14 and telephony devices 16, 18 may communicate with each other and use any functions, services, or features provided by one or more Bluetooth protocol profiles that wireless security device 14 and telephony devices 16, 18 share.
- wireless security device 14 and telephony devices 16, 18 may retain their paired status regardless of whether wireless security device 14 and telephony devices 16, 18 are turned off. For example, if wireless security device 14 is powered off, wireless security device 14 and telephony devices 16, 18 may retain their paired status so that, when wireless security device 14 is powered back on, wireless security device 14 and/or telephony devices 16, 18 may continue to communicate without the need to re-establish a paired connection.
- FIG. 4 depicts wireless security device 14 and telephony device 16 sharing a paired wireless Bluetooth connection.
- Security process 10 may provide features that allow a user to dial an emergency phone number. For example, security process 10 may receive 306 a location of a telephony device (e.g. telephony devices 16, 18), may identify 308 a location of the telephony device, and may identify 308 an appropriate emergency phone number based on the location of the telephony device. Security process 10 may also send 310 a command to the telephony device to place a telephone call to the identified 308 emergency phone number. Once the telephone call is connected, security process 10 may send 312 a prerecorded message to the telephony device. The prerecorded message may contain data and/or audio helpful for identifying the nature of the emergency.
- a telephony device e.g. telephony devices 16, 18
- Security process 10 may also send 310 a command to the telephony device to place a telephone call to the identified 308 emergency phone number.
- security process 10 may send 312 a prerecorded message to the tele
- the telephony device may play the prerecorded message over the connected emergency phone call. Additionally/alternatively, if the prerecorded message contains data and/or text, the telephony device may send the data and/or text to an emergency service center as a data or text message, or through the connected emergency phone call.
- Receiving 306 the location of a telephony device e.g. telephony device
- security process 10 may include sending 312 a command to the telephony device requesting the location of the telephony device.
- security process 10 may receive 314 a response from the telephony device that includes the telephony devices location, or includes information that may be used to identify the telephony device's location.
- Security process 10 may then determine 316 the location of the telephony device based on the received 314 response.
- the command may be a request for the telephone number of the telephony device, a request for the identification of a telephone service that is providing cellular or data service to the telephony device, and/or a global positional system (GPS) location of the telephony device, for example.
- GPS global positional system
- the received 314 response may include the telephone number of the telephony device, an identification of the telephone service that is providing cellular or data service to the telephony device, and or a GPS location of the telephony device, for example.
- FIG 5 is a diagram depicting receiving 306 the location of a telephony device.
- Wireless security device 14 may send 312 request 502 to telephony device 16. If request 502 includes a request for telephony device 16's telephone number, telephony device 16 may send data 504 back to wireless security device 14. In this case, data 504 may include telephony device 16's phone number. If request 502 includes a request for the identification of a network providing service to telephony device 16, then telephony device may contact telephony device's service provider to acquire the identification. Telephony device 16 may then send data 504, which may include the identification of the network, to wireless security device 14.
- a request 502 for the identification of the network may include the AT+COPS command, an AT modem command that can identify all available networks, for example.
- wireless security device 14 may send 312 an AT command, such as the AT+COPS command, to telephony device 16.
- Telephony device 16 may then respond to wireless security device by sending data 504, which may include the telephony device 16's network information, the telephony device 16's location, or information relating to telephony device 16's location, as discussed above.
- Telephony device may also include a GPS receiver (not shown). If request
- telephony device 502 includes a request for a GPS location of telephony device 16, telephony device may communicate with GPS satellite to determine a GPS location. Once telephony device 16 determines a GPS location, telephony device may send data 504, which may include the GPS location, to wireless security device 14.
- a request 502 for the GPS location of the telephony device may include the AT+CMOLRG command, an AT modem command that requests a GPS location of the telephony device, for example.
- wireless security device 14 may send 312 an AT command, such as the AT+CMOLRG command, to telephony device 16. Telephony device 16 may then respond to wireless security device by sending data 504, which may include telephony device 16's GPS location.
- Security process 10 may identify 308 an emergency phone number based, at least in part, upon the received 306 location of a telephony device (e.g. telephony device 16, 18). For example, if the received location indicates that telephony device is in the United States, security process 10 may identify the emergency phone number "911" as an appropriate emergency phone number to call, or may identify an appropriate national emergency service "800" number.
- a telephony device e.g. telephony device 16, 18.
- security process 10 may identify the emergency phone number "911" as an appropriate emergency phone number to call, or may identify an appropriate national emergency service "800" number.
- Security process 10 may identify 308 the emergency phone number based on the location information received 306 from telephony device 16. If the location information includes the telephony device's telephone number, security process 10 may use the telephone number to identify the telephony device's location and an appropriate telephone number. For example, if the location information contains the telephone number "617-555- 5555," security process 10 may recognize that telephone extension "617" is associated with a geographical location in eastern Massachusetts. Accordingly, security process 10 may identify 308 the emergency phone number "911" (the emergency phone number for the United States) as the appropriate emergency phone number to call, or may identify an appropriate national emergency service "800" number.
- security process 10 may use the country code to identify 308 the emergency phone number. For example, if the telephone number includes the country code "44" (the country code for Great Britain), security process 10 may identify emergency phone number "112" (the emergency phone number for Great Britain and/or Europe) as the appropriate emergency phone number.
- security process 10 may use the identifier to identify the telephony device's location and an appropriate telephone number. For example, if the network provider is located in Japan, security process 10 may identify 308 the emergency telephone number "110" (the emergency police number in Japan) as the appropriate emergency telephone number.
- security process 10 may use the GPS coordinates to identify 308 an appropriate telephone number. For example, if the GPS coordinates are 13° 06' north latitude and 59° 37' west longitude (i.e. GPS coordinates that fall within the boundaries of Bridgetown, Barbados), then security process 10 may identify 308 the emergency telephone number "211" (the emergency police number in Barbados), as the appropriate emergency telephone number.
- FIG. 6 includes lookup table 600, which is an example of a lookup table that may be used to identify 308 an emergency phone number.
- Lookup table 600 may be a data table or data structure stored, for example, in memory 204. As shown in FIG. 6, lookup table 600 may have two columns: a left column contains countries, and a right column contains emergency telephone numbers associated with the countries in the left column. Of course, lookup table 600 may have additional columns with additional information.
- security process 10 can correlate 320 the location to the appropriate emergency phone number in lookup table 600. For example, if security process 10 determines 316 that telephony device is in the United States, security process 10 can find the entry "USA" within lookup table 600 and determine that emergency phone number "911" is the appropriate emergency phone number for the location, or may identify an appropriate national emergency service "800" number. Although this example shows lookup table 600 having entries based on countries, one of ordinary skill in the art will recognize that other type of data may be used to locate entries in lookup table 600.
- lookup table 600 may include entries based on countries, states, country codes, area codes, GPS locations, ranges of latitude and longitude, and/or any other type of entry associated with a geographic location.
- Lookup table 600 may include emergency telephone numbers for any type of geographic location identifier.
- lookup table 600 may also have entries based on latitudinal and longitudinal ranges.
- an entry in lookup table 600 may be a range of latitudinal and longitudinal coordinates that define the boundaries of Barbados.
- Lookup table 600 may associate the ranges that define Barbados with emergency phone number 211— the emergency number for Barbados.
- security process 10 may identify 308 the appropriate emergency phone number for Barbados by finding the entry that contains the appropriate range of latitudinal and longitudinal coordinates in lookup table 600.
- Lookup table 600 may be a table and/or data structure stored in memory
- Lookup table 600 may be an array, a database, a hashtable, a class, a data structure, an XML file, and/or any other type of table or data structure that may associate geographic locations with emergency telephone numbers, for example.
- security process 10 may send 310 a command to the telephony device (e.g. telephony device 16, 18) to place an emergency telephone call to the identified 308 emergency phone number.
- the command may be a Bluetooth command, and/or AT and/or modem command that instructs the telephony device to place a call to the emergency telephone number.
- security process 10 may send 312 a prerecorded message to the telephony device and instruct the telephony device to deliver the prerecorded message to the emergency service or other party on the other end of the emergency telephone call.
- the prerecorded message may include important information about the emergency, such as the name and address of the owner of wireless security device 14, for example.
- the prerecorded message may include other information, such as the received 306 location of the telephony device.
- security process 10 may facilitate the emergency service in quickly and efficiently sending the appropriate help to locate the device, especially if the owner of wireless security device 14 is unable speak or otherwise provide information to the emergency service his/herself.
- the prerecorded message may be an audio message and/or a data message.
- security process 10 may use the hands-free and/or headset Bluetooth profile to play the audio message through the telephony device, so a listener (e.g. an emergency technician) on the other end of the telephone call can hear the prerecorded message.
- security process 10 may send the message as a text message or other type of data message so a listener (e.g. an emergency technician) on the other end of the telephone call can view the data in the prerecorded message.
- security process 10 may send one or more AT commands to telephony device 16 that cause telephony device 16 to send an SMS text message to the listener.
- the AT commands may be sent through one or more of the Bluetooth wireless profile interfaces, and may include AT commands such as AT+CMGF, which may set a modem into text mode in order to send an SMS text message.
- the text message may include emergency information that allows the listener/receiver of the text message to ascertain the identity of a user, the location of a user, the nature of the emergency, and other information important to identify the emergency and send the appropriate help.
- telephony device 16 may execute an application (not shown) that facilitates creation of the text message.
- Security process 10 may also provide 322 speakerphone services. For example, if the telephony device places a telephone call, security process 10 may use the hands-free and/or headset Bluetooth protocol profile to send audio/voice to and/or receive audio/voice data from the telephony device. Wireless security device 14 may use speaker 210 to play the audio/voice data from the telephone call, and/or may use microphone 212 to capture audio/voice data for the telephone call. Security process 10 may provide 322 speakerphone services for normal telephone calls placed or received by the telephony device, and/or for the emergency telephone call described above.
- Security process 10 may also generate different kinds of notifications for various scenarios. As shown in FIG. 7, security process 10 may generate a notification by playing a sound through speaker 210 (e.g. a beep or an audio media file), activating vibration motor 214, and/or illuminate one or more indicators in LED bank 216.
- speaker 210 e.g. a beep or an audio media file
- wireless security device 14 may include any manner of electronic visual indicator, including, but not limited to: LEDs, LCD displays, or other visual indicators. The sound, tactile feedback, and visual feedback generated by wireless security device 14 may alert a user that an event has occurred.
- Wireless security device 14 may generate a notification through any combination of activation and deactivation of speaker 210, vibration motor 214, and/or LED bank 216. Security process 10 may generate different notifications for various different scenarios.
- wireless security device 14 may receive notification of the telephone call through features of the hands-free and/or headset Bluetooth protocol profiles, for example. Wireless security device 14 may then generate 324 a telephone call notification to alert a user that there is an incoming call.
- wireless security device may generate 326 an out-of-range notification so that a user can keep track of his/her wirelessly connected devices. For example, if telephony device 16 and wireless security device 14 become separated physically, wireless security device 14 may generate an out-of-range notification to alert a user that telephony device 16 is no longer nearby.
- Security process 10 may determine that telephony device 16 is out of range by monitoring a quality parameter of the wireless connection between wireless security device 14 and telephony device 14 (or any other wirelessly connected device). If the quality parameter falls below a predetermined threshold, security process 10 may generate a notification.
- Security process 10 may monitor and measure the quality of the wireless connection.
- Security process 10 may periodically measure and/or monitor a received signal strength indication (RSSI) of the wireless connection, or may measure and/or monitor a number of digital data errors received over the wireless connection.
- RSSI received signal strength indication
- the value of the RSSI measurement may decrease and/or the number of digital data errors may increase. If the RSSI falls below a predetermined minimum threshold, it may indicate that telephony device 16 is distant from wireless security device 14. Similarly, if the digital data error measurement falls above a predetermined maximum, it may indicate that telephony device 16 is distant from wireless security device 14. Accordingly, wireless security device may generate 324 an out of range notification.
- a user may use the out of range notification as a warning that the wirelessly connected device has been left behind or stolen.
- a user may attach wireless security device 14 to his/her keychain. If a user walks away from telephony device 16 after leaving telephony device 14 in a taxi-cab, for example, wireless security device 14, attached to the user's keychain, may generate a notification warning the user that he/she has left telephony device 16 behind.
- Security process 10 may escalate the out-of-range notification as telephony device 16 moves further away from wireless security device 14.
- Security process 10 may include, for example, multiple wireless connection quality thresholds. As telephony device 16 moves away from wireless security device 14, the measurement of the quality of the wireless connection may continue to degrade. As the measurement degrades further, it may pass a second threshold. When the measurement passes the second threshold, security process 10 may escalate the notification by, for example, playing a sound through speaker 210, activating vibration motor 214, and/or illuminating LED bank 216.
- Security process 10 may escalate the notification in various ways, such as raising the volume of speaker 210, changing a pattern of beeps played by speaker 210, providing more power to vibration motor 216, and flashing the LEDs of LED bank 216, for example.
- security process 10 may include multiple quality thresholds and multiple escalations of the notification.
- a user may cancel the out-of-range notification by pressing button 218.
- security process 10 may cancel the out-of range notification. Additionally/alternatively, security process 10 may de-escalate an out-of-range notification as wireless security device 14 and telephony device 16 come into closer range of each other. For example, security process 10 may measure the quality of the wireless connection between security device 14 and telephony device 16 and, as the measurement of the quality improves, security process 10 may de-escalate an out-of-range notification.
- Security process 10 may generate 326 a unique out of range notification for each device wirelessly connected to wireless security device 14.
- FIG. 1 shows wireless security device coupled to at least telephony devices 16, 18, and media player 20. If telephony device 16 begins to go out of range, security process 10 may generate 326 a particular out of range notification that may consist of a particular series of sounds, vibrations, and/or flashing of indicators. However, if media player 20 or telephony device 18 begin to go out of range, security process 10 may generate 326 a different out of range notification that may consist of a different series of sounds, vibrations, and/or flashing indicators. Security process 10 may generate 326 a different and unique out of range notification for each device wirelessly connected to wireless security device 14.
- Security process 10 may generate 328 an out of range notification by sending a command to a wirelessly connected device. For example, if telephony device 16 begins to go out of range, security process 10 may send a command to telephony device 16 that causes telephony device 16 to beep, or make some other noise or alert to notify a user that telephony device 16 and wireless security device 14 are far apart.
- telephony device 16 may include a preexisting command which, when received, will cause telephony device 16 to beep or make a noise. In this case, wireless security device 14 may send the preexisting command to telephony device.
- telephony device 16 may execute a custom software application (not shown) that provides a custom interface.
- the custom software application and/or custom interface may accept the command from wireless security device 14 and may cause telephony device 16 to generate 328 the out of range notification.
- Security process 10 may also generate 328 a disconnect notification if someone tries to disconnect the wireless connection through a user interface of a wirelessly connected device. For example, many cellular telephones have user interfaces that allow a user to disconnect a paired Bluetooth device. If telephony device 16 is paired to wireless security device 16, and someone accesses a user interface of telephony device 16, he/she may be able disconnect wireless security device 14 from telephony device 16 by removing the pairing. If someone attempts to or succeeds in removing the pairing between wireless security device 14 from telephony device 16, wireless security device 14 may generate 328 a disconnect notification.
- the security process 10 may also cancel the notification to the user.
- wireless security device 14 may inform the user that telephony device 16 and/or wireless security device 14 have become reconnected and/or have reentered the user's proximity.
- the security device 14 may also send a command to telephony device 16 to cancel a disconnect or out-of- range notification on telephony device 16.
- Security process 10 may also cause 330 a telephony device to answer an incoming call, or cause 332 a telephony device to cancel or ignore an incoming call.
- wireless security device 14 may generate 324 a telephone call notification, as described above.
- a user of wireless security device may then activate button 218, by pushing button 218, for example.
- Activating button 218 may cause wireless access device 14 to send a command to the telephony device, instructing the telephony device to answer the call. If the user activates button 218 in a different way, by double-pushing button 218, for example, wireless security device may send a command to the telephony device, instructing the telephony device to cancel or ignore the call, for example.
- Security process 10 may also generate 334 a panic alarm in response to activation of button 218. If a user presses and holds button 218, for example, security process 10 may cause wireless security device 14 to generate 334 a panic alarm.
- the panic alarm may be a loud, audible alarm, whistle, beep, and/or warning played through speaker 210.
- the warning may be an audio file (such as an MP3) that loudly recites the words "Warning, Emergency," or provides some other message indicating an emergency.
- the panic alarm may be loud enough to alert passers-by that someone may be in trouble.
- the panic alarm may also be loud enough to warn or scare a perpetrator who may be thinking of causing harm.
- Security process 10 may cancel 336 the panic alarm in response to a user activating the button, for example, or in response to other input, such as a command from the telephony device, etc.
- Button 218 may provide a primary user interface to wireless security device 14.
- Button 218 may be a multi-function button that provides various features and functions depending upon how a user pushes button 218. For example, if a user presses and holds button 218, wireless security device 16 may initiate an emergency telephone call, as described above. If the user continues to hold button 218 for a longer time, for example, wireless security device may generate 334 a panic alarm, as described above. If a user single- presses or double-presses button 218, wireless security device may cause a telephony device to answer or cancel a call, as described above.
- One skilled in the art will recognize that different patterns of activation, and durations of activation, of button 218 may cause wireless security device 16 and/or security process 10 to perform various functions, or may vary the order by which the functions are performed.
- FIG. 8 shows an exterior view of an embodiment of wireless security device 14.
- wireless security device may include light rings 802, which may be a light ring or light pipe that illuminates when one or more LEDs are activated.
- Wireless security device 14 may also include a display (e.g. an LCD display) or other mechanism which may illuminate or provide visual feedback.
- Wireless security device may also include keyring attachment 804, which may be a cut out portion of the outer casing of wireless security device 14. Keyring attachment 804 may allow a user to attach wireless security device 14 to a keyring, purse, article of clothing, or other article.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/554,517 US8351895B2 (en) | 2009-09-04 | 2009-09-04 | Wireless security device and method to place emergency calls |
PCT/US2010/044077 WO2011028345A1 (en) | 2009-09-04 | 2010-08-02 | Wireless security device and method |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2474151A1 true EP2474151A1 (en) | 2012-07-11 |
EP2474151B1 EP2474151B1 (en) | 2017-11-01 |
Family
ID=42938460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10742958.1A Not-in-force EP2474151B1 (en) | 2009-09-04 | 2010-08-02 | Wireless security device and method |
Country Status (3)
Country | Link |
---|---|
US (2) | US8351895B2 (en) |
EP (1) | EP2474151B1 (en) |
WO (1) | WO2011028345A1 (en) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9848447B2 (en) | 2007-06-27 | 2017-12-19 | Ford Global Technologies, Llc | Method and system for emergency notification |
US20090237209A1 (en) * | 2008-03-20 | 2009-09-24 | Brian William Seal | Communicating keychain |
US8903351B2 (en) | 2009-03-06 | 2014-12-02 | Ford Motor Company | Method and system for emergency call handling |
CN102576486A (en) * | 2009-08-26 | 2012-07-11 | 大陆汽车有限责任公司 | Systems and methods for emergency arming of a network access device |
US8903354B2 (en) | 2010-02-15 | 2014-12-02 | Ford Global Technologies, Llc | Method and system for emergency call arbitration |
US20120190324A1 (en) | 2011-01-25 | 2012-07-26 | Ford Global Technologies, Llc | Automatic Emergency Call Language Provisioning |
US8818325B2 (en) | 2011-02-28 | 2014-08-26 | Ford Global Technologies, Llc | Method and system for emergency call placement |
US8676121B1 (en) * | 2011-05-31 | 2014-03-18 | Globalstar, Inc. | Method and apparatus for transmitting message from short-range wireless device over a satellite network |
JP5903815B2 (en) * | 2011-09-15 | 2016-04-13 | 株式会社リコー | Information transmission system, information transmission device, information reception device, information transmission program, and information reception program |
IL216073A0 (en) * | 2011-10-31 | 2012-02-29 | Cardo Systems Inc | Mobile device for group activities having broadcasting of emergency messages capability |
EP2807817A4 (en) * | 2012-01-24 | 2015-12-09 | Secure Couture Llc | System utilizing a combination for including information within an outbound communication channel of a mobile telephony-capable computing device |
US8594616B2 (en) * | 2012-03-08 | 2013-11-26 | Ford Global Technologies, Llc | Vehicle key fob with emergency assistant service |
US8929853B2 (en) * | 2012-09-05 | 2015-01-06 | Apple Inc. | Mobile emergency attack and failsafe detection |
WO2014048994A2 (en) | 2012-09-26 | 2014-04-03 | Hippih Holding Aps | Alarm system with geoposition based behaviour for mobile terminals |
US9363010B2 (en) | 2012-12-03 | 2016-06-07 | Samsung Electronics Co., Ltd. | Mobile terminal and method of controlling function of the mobile terminal |
US9049584B2 (en) | 2013-01-24 | 2015-06-02 | Ford Global Technologies, Llc | Method and system for transmitting data using automated voice when data transmission fails during an emergency call |
US9646473B2 (en) * | 2013-03-04 | 2017-05-09 | Revolar, Inc | Interchangeable personal security device |
US9520050B2 (en) | 2013-03-04 | 2016-12-13 | Revolar, Inc. | Interchangeable personal security device with a communication accessory |
WO2015069031A1 (en) * | 2013-11-06 | 2015-05-14 | 엘지전자(주) | Method and apparatus for forming communication link using bluetooth |
AT515334B1 (en) | 2014-02-13 | 2015-12-15 | Daniel Rumetshofer | Method for generating an emergency call signal |
US9349277B2 (en) * | 2014-04-01 | 2016-05-24 | Prof4Tech Ltd. | Personal security devices and methods |
KR20150124785A (en) | 2014-04-29 | 2015-11-06 | 삼성전자주식회사 | Apparatas and method for providing a video telephony emergency call service in an electronic device |
US20150324616A1 (en) | 2014-05-12 | 2015-11-12 | Sahal Alarabi | Security and protection device and methodology |
US9756454B1 (en) | 2014-05-19 | 2017-09-05 | Silent Beacon, Llc | Portable wearable primary device which communciates data to secondary device that is in communication with multiple networks and related communication systems |
US9773404B2 (en) | 2014-07-11 | 2017-09-26 | SHIELDtech Inc. | Module mobile emergency notification system |
US9473920B2 (en) | 2014-07-22 | 2016-10-18 | Pom-Co Partners, Inc. | Personal security alert and monitoring apparatus |
US9906930B2 (en) * | 2015-04-10 | 2018-02-27 | GuardLlama Inc. | System and method for mobile personal emergency response |
US20160307416A1 (en) * | 2015-04-17 | 2016-10-20 | Sennco Solutions, Inc. | Apparatus, system, and/or method for monitoring a device within a zone |
IT201600080684A1 (en) * | 2016-08-01 | 2018-02-01 | Sertea Web Srl | CONTROL DEVICE FOR A MEDIA VISUALIZATION EQUIPMENT AND EMERGENCY PROCEDURE BY SUCH A DEVICE |
DE102017002548A1 (en) * | 2017-03-16 | 2018-09-20 | Norbert Gröblinghoff | emergency procedures |
US10278051B2 (en) * | 2017-04-06 | 2019-04-30 | Microsoft Technology Licensing, Llc | Proximity detection of mobile devices for emergency calling |
US10791715B1 (en) | 2017-11-29 | 2020-10-06 | Christopher Rotberg | Tracking device |
AT521138B1 (en) * | 2018-06-21 | 2019-11-15 | Adaptive Regelsysteme Ges M B H | Arrangement and method for coordinating assistance in the event of a power accident |
KR102540757B1 (en) | 2018-08-27 | 2023-06-08 | 삼성전자주식회사 | An electronic device controlling a property of a screen based on a distance between pen input device and the electronic device, and control method thereof |
JP2022055883A (en) * | 2020-09-29 | 2022-04-08 | 株式会社Subaru | vehicle |
Family Cites Families (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5635897A (en) | 1995-08-22 | 1997-06-03 | Kuo; Shih-Chun | Mobile phone alarm |
US6624754B1 (en) * | 1998-01-20 | 2003-09-23 | Hoffman Resources Llc | Personal security and tracking system |
US5796338A (en) | 1997-02-03 | 1998-08-18 | Aris Mardirossian, Inc. | System for preventing loss of cellular phone or the like |
FR2769738B1 (en) | 1997-10-15 | 2000-03-17 | Mjp International | DEVICE FOR MONITORING ROOMS WITH EQUIPMENT PROVIDED WITH A MAIN SURVEILLANCE SYSTEM PROVIDED WITH SOUND ALARM MEANS |
US6265974B1 (en) | 1998-06-19 | 2001-07-24 | Lexent Technologies, Inc. | Systems and methods for monitoring spatial relationship between mobile objects |
FR2784485B1 (en) | 1998-10-07 | 2001-02-23 | Pierre Sorriaux | SPACE SEPARATION WARNING DEVICE BEYOND A PREDETERMINED LIMIT |
KR100344872B1 (en) * | 1999-09-29 | 2002-07-19 | 엘지정보통신주식회사 | Emergency call origination method in mobile terminal |
KR100353215B1 (en) | 1999-11-30 | 2002-09-18 | 삼성전자 주식회사 | The missing prevention device of the mobile phone with blue_tooth and method thereof |
JP3452029B2 (en) * | 2000-05-17 | 2003-09-29 | 日本電気株式会社 | Mobile phone terminal device and mobile phone system using the same |
GB2363504A (en) | 2000-06-16 | 2001-12-19 | Nokia Mobile Phones Ltd | A mobile phone including a device for preventing loss or theft |
US6462660B1 (en) | 2001-01-25 | 2002-10-08 | Agere Systems Guardian Corp. | Wireless piconet-based personal electronic property reminder |
EP1251472A1 (en) * | 2001-04-18 | 2002-10-23 | Sony International (Europe) GmbH | Means for loss protection of a mobile terminal |
US20030008659A1 (en) * | 2001-06-20 | 2003-01-09 | Waters John Deryk | Locating items |
US7009512B2 (en) | 2001-07-13 | 2006-03-07 | Juan Carlos Cordoba | Alarm system for a portable device |
WO2003009620A1 (en) | 2001-07-18 | 2003-01-30 | Wizard Mobile Solutions Limited | Data security device |
US6892083B2 (en) * | 2001-09-05 | 2005-05-10 | Vocera Communications Inc. | Voice-controlled wireless communications system and method |
DE10152830A1 (en) | 2001-10-25 | 2003-05-08 | Philips Corp Intellectual Pty | Security system for portable electrical devices |
US7075433B2 (en) | 2002-01-26 | 2006-07-11 | International Business Machines Corporation | Bluetooth theft control |
US6836212B2 (en) | 2002-10-10 | 2004-12-28 | Motorola, Inc. | Method and apparatus for reducing the likelihood of losing a portable electronic device |
US20040203570A1 (en) * | 2002-11-27 | 2004-10-14 | Jeffrey Berger | Apparatus and method for utilizing an emergency button of a communication device accessory |
US7953454B2 (en) * | 2003-03-21 | 2011-05-31 | Sony Ericsson Mobile Communications Ab | Wireless hands-free system with silent user signaling |
US7546112B2 (en) * | 2003-03-21 | 2009-06-09 | Qisda Corporation | Single telephone number calling method and calling apparatus for mobile unit |
EP1629449B1 (en) | 2003-05-26 | 2008-09-03 | Securecom Technologies Limited | A portable communications device |
US7251470B2 (en) | 2003-06-25 | 2007-07-31 | Nokia Corporation | Emergency response system with personal emergency device |
CN2859943Y (en) | 2005-12-14 | 2007-01-17 | 锡盛通讯有限公司 | Mobile terminal prompting reset structure |
CN1316326C (en) | 2003-12-19 | 2007-05-16 | 国际商业机器公司 | Method and system for securing an electronic device |
US20050143152A1 (en) * | 2003-12-30 | 2005-06-30 | Yueh Wen H. | Wireless earphone with incoming call vibration function |
US20050176402A1 (en) * | 2004-02-11 | 2005-08-11 | Anthony Verloop | Method of making an emergency telephone call and an automatic calling apparatus for making such call |
US7333776B1 (en) | 2004-03-25 | 2008-02-19 | Joseph York | Phone alert |
US7259671B2 (en) | 2004-06-21 | 2007-08-21 | Christine Ganley | Proximity aware personal alert system |
JP4462614B2 (en) | 2004-07-05 | 2010-05-12 | ソニー・エリクソン・モバイルコミュニケーションズ株式会社 | Short-range wireless communication system, portable terminal device, and wireless communication device |
US7257374B1 (en) | 2004-12-10 | 2007-08-14 | Cingular Wireless Ii, Llc | Automatic security locking method and system for wireless-enabled devices |
BRPI0501159A (en) | 2005-01-21 | 2006-09-05 | Odair Menegotto | improvement in mobile phone and related device equipped with user spacing sensor |
US7336173B1 (en) | 2005-04-11 | 2008-02-26 | Alexander Sandbrand | Owner aware objects |
US7664463B2 (en) | 2005-08-17 | 2010-02-16 | Mourad Ben Ayed | Portable loss prevention system |
WO2007039328A1 (en) | 2005-09-28 | 2007-04-12 | International Business Machines Corporation | Adaptive rule based electronic reminder for personal objects |
US7535357B2 (en) | 2005-10-31 | 2009-05-19 | Olusola Enitan | Proximity alarm system for articles |
US7844247B2 (en) * | 2006-01-25 | 2010-11-30 | International Business Machines Corporation | System for automatic wireless utilization of cellular telephone devices in an emergency by co-opting nearby cellular telephone devices |
US20070109120A1 (en) * | 2006-07-26 | 2007-05-17 | Guenter Schaefer | Apparatus and method for preventing loss of a mobile telephone and for locating a lost mobile telephone |
GB0615333D0 (en) | 2006-08-02 | 2006-09-13 | Reed Christopher W | Mobile telephone accessory |
GB0622666D0 (en) * | 2006-11-14 | 2006-12-20 | Promotion And Display Technolo | Telecommunication device |
TW200832293A (en) | 2007-01-26 | 2008-08-01 | Inventec Appliances Corp | Handheld electronic device anti-stolen mechanism |
US20080214111A1 (en) | 2007-03-02 | 2008-09-04 | Celltrust Corporation | Lost phone alarm system and method |
US20080214142A1 (en) * | 2007-03-02 | 2008-09-04 | Michelle Stephanie Morin | Emergency Alerting System |
US9848447B2 (en) * | 2007-06-27 | 2017-12-19 | Ford Global Technologies, Llc | Method and system for emergency notification |
DE202007009831U1 (en) | 2007-07-12 | 2007-10-31 | Schönemann, Jörg | Portable device |
US8457617B2 (en) * | 2007-08-30 | 2013-06-04 | Centurylink Intellectual Property Llc | System and method for a wireless device locator |
US8295766B2 (en) | 2007-08-31 | 2012-10-23 | Motorola Mobility Llc | Methods and devices for automatic multiple pairing of Bluetooth devices |
US8112037B2 (en) * | 2008-09-02 | 2012-02-07 | Nissaf Ketari | Bluetooth assistant |
-
2009
- 2009-09-04 US US12/554,517 patent/US8351895B2/en active Active - Reinstated
-
2010
- 2010-08-02 EP EP10742958.1A patent/EP2474151B1/en not_active Not-in-force
- 2010-08-02 WO PCT/US2010/044077 patent/WO2011028345A1/en active Application Filing
-
2013
- 2013-01-07 US US13/735,482 patent/US20130122853A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2011028345A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20110059720A1 (en) | 2011-03-10 |
US20130122853A1 (en) | 2013-05-16 |
WO2011028345A1 (en) | 2011-03-10 |
US8351895B2 (en) | 2013-01-08 |
EP2474151B1 (en) | 2017-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8351895B2 (en) | Wireless security device and method to place emergency calls | |
US20150223271A1 (en) | Wireless security device and method to place emergency calls | |
US7375629B1 (en) | Close proximity alert system and method | |
JP2007534269A (en) | Hands-free notification for wireless communication terminals | |
US20050288067A1 (en) | Incoming call alert adapter for mobile devices | |
CN104767860A (en) | Incoming call prompt method and device and terminal | |
CN101662313A (en) | System and method for searching communication device by blue tooth | |
KR20100063837A (en) | Apparatus and method for providing sos service in a portable device | |
US8774776B1 (en) | Alert device for mobile communications devices | |
KR101302239B1 (en) | Methods and apparatus for use in processing disconnected emergency calls and other communications involving mobile communication devices and the remote monitoring thereof | |
EP2509291B1 (en) | System and method for locating a misplaced mobile device | |
JP4457904B2 (en) | Mobile communication terminal device and program | |
JP2007053507A (en) | Voice output device | |
EP2552126B1 (en) | Earpiece messaging | |
EP2223394B1 (en) | Connector for connecting at least one output device to a rendering device and method for managing the connection | |
JP2014068104A (en) | Portable terminal, voice control program and voice control method | |
WO2016019195A1 (en) | Method and electronic device for individualizing ringtones | |
JP4551677B2 (en) | In-vehicle device, control method for in-vehicle device, control program, and recording medium | |
US20110053511A1 (en) | Connector for connecting a rendering device to at least one output device and method for managing output | |
JP2006217258A (en) | Cell phone unit and data display method of cell phone unit | |
WO2016145802A1 (en) | Communication service processing method, system and system supporting wearable device communication service | |
JP2006217259A (en) | Cell phone unit | |
JP2007043626A (en) | Cell-phone unit | |
CN214011523U (en) | But remote control's pet positioner | |
WO2002037886A1 (en) | Wireless communication system, speech regulating message inserting method, speech regulating method, wireless communication device, communication regulating method and information storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120326 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602010046373 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04M0001725000 Ipc: H04M0001600000 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04M 1/725 20060101ALI20170413BHEP Ipc: H04M 1/60 20060101AFI20170413BHEP |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20170526 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: AT Ref legal event code: REF Ref document number: 943086 Country of ref document: AT Kind code of ref document: T Effective date: 20171115 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602010046373 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20171101 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 943086 Country of ref document: AT Kind code of ref document: T Effective date: 20171101 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180201 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180301 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180202 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180201 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602010046373 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1172758 Country of ref document: HK |
|
26N | No opposition filed |
Effective date: 20180802 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 9 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180831 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180802 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180831 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180802 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20100802 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20171101 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171101 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IE Payment date: 20220228 Year of fee payment: 12 Ref country code: GB Payment date: 20220228 Year of fee payment: 12 Ref country code: DE Payment date: 20220228 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20220228 Year of fee payment: 12 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602010046373 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20220802 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220802 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220831 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230301 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220802 |